Unit 4 Assignment Directions: Case Studies in Governance, AI, and DIM
Purpose
In this assignment, you will write analyses of four (4) case studies to demonstrate how the NIST Digital Identity Guidelines and AI approach would be implemented. Now that you have reviewed the key documents, use the sources provided here and your own research to analyze the following scenarios. There is a lot of information available on these issues. The questions are intended to focus you on a few sectors.
Directions
In your analyses, be sure to address each of the questions listed under each case.
- In your response to these questions, define the topic you are addressing, and cite a source for your rationale.
- Provide clear, structured responses in which you answer the direct question, and then follow each response with additional information that demonstrates you understand the topic by using appropriate terms and concepts.
- Please support any response that makes use of research or provided resources with a citation. If you work in this field, you may also apply your direct knowledge to your response.
- Please indicate how you acquired this direct knowledge.
Your responses to the questions in each of the four case studies are worth 25 points, for a total of 100 points.
Case Studies
Case Studies
Case Study A: Digital Idenitity Management, Data Privacy, and Access
A state issues a single digital identity to provide access to state government services online, such as tax filing, voter registration, and license renewals.
- What is digital identity management (DIM)? Define the term and explain why it is a good tool for governments with limited resources to use to provide citizens with access to governmental resources and information.
- What steps would state officials take to protect
the personally identifiable information of each citizen? List a few of these steps and explain how they provide data security.
What policies would the state officials need to have in place from a risk management (RM) perspective? List several of these policies and explain what they would need to include.
What best practices from the NIST DIM resource would support a series of best practices for this case? List several of these best practices and provide the sources and rationale for this information.
One specific provision in NIST 800-63 allows for the use of a pseudonym for access to government digital services wherever possible and, even where full identification is necessary, to limit the amount of personal information collected as much as possible. Does that make sense in this case? Why or why not?
Note: This is an open-ended question with pros and cons. Use your opinion, but base your response on the requirements that you use in a risk management (RM) approach. Hint: Think about the governance function that maintains privacy and security while allowing access to information. Does this function hinder or help? If a policy complies with regulations, it is allowed.
Additionally, each of your case study analyses must address the following prompts:
- Evidence of skills: Demonstrate your knowledge of security policy and procedures, security governance, and industry-specific compliance.
- Write the paper with an organized, logical flow of information. Cite authoritative sources sufficiently to show that your analysis is based on the documents provided and other documents you find through your research. Please use a consistent citation style.
To remind yourself how to cite references, visit the Library’s APA Document Formatting (7th Edition) and APA 7th Edition Citation Examples.
Related; You are a regional marketing director of a theme park in the southeastern United States.
Order This Paper
Reviews
There are no reviews yet.